Search for "Mo" returned 9996 results
94 min
Security Nightmares 2009
Oder: worüber wir nächstes Jahr lachen werden
52 min
Securing the Campaign
Security and the 2012 US Presidential Election
56 min
Console Hacking 2008: Wii Fail
Is implementation the enemy of design?
65 min
eVoting after Nedap and Digital Pen
Why cryptography might not fix the issue of transparent…
82 min
Attacking NFC mobile phones
First look at the security of NFC mobile phones
67 min
Life is a Holodeck!
An overview of holographic techniques
58 min
Hacking how we see
A way to fix lazy eye?
16 min
o͈̮p̢ęr̕a͠t̶̨i͟oǹ͓̜a̵l̷ glit̶̨ć̶̛he͝s
How To Make Human Machine Readable
54 min
Singing Capacitors and Whining Inductors
A Practical Introduction to Acoustic Cryptanalysis
38 min
Konferenzorganisation mit Ruby
Do-It-Yourself Konferenzmanagement und Videostreaming
27 min
systemd soft-reboot and surviving it as application
How to leverage systemd soft-reboot in openSUSE
29 min
Pluggable CPU schedulers in openSUSE
How to write your own CPU scheduler with openSUSE
32 min
Internet of Dongs
A long way to a vibrant future
54 min
How medicine discovered sex
Introduction to sex- and gender-sensitive medicine
66 min
Network Flow Analysis using Netflow protocols and tflow2
How to know what your network does
30 min
Ignorance and Peace Narratives in Cyberspace
Cloud Computing, Assessment, and Fools like Me.
66 min
The Baseband Apocalypse
all your baseband are belong to us
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
63 min
Science for future?
What we can and need to change to keep climate change low -…
68 min